发布时间 :2006-02-13 17:02:00
修订时间 :2017-07-19 21:29:57

[原文]Multiple SQL injection vulnerabilities in cms/index.php in Magic Calendar Lite 1.02, with magic_quotes_gpc disabled, allow remote attackers to execute arbitrary SQL commands via the (1) $total_login and (2) $total_password parameter.

[CNNVD]Magic Calendar Lite Index.PHP SQL注入漏洞(CNNVD-200602-171)

        Magic Calendar Lite 1.02的cms/index.php中存在多个SQL注入漏洞。在禁用magic_quotes_gpc的情况下,远程攻击者可以借助(1) $total_login和(2) $total_password参数执行任意SQL命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20060220 [eVuln] Magic Calendar Lite Authentication Bypass
(UNKNOWN)  BID  16646
(UNKNOWN)  BID  16734
(UNKNOWN)  VUPEN  ADV-2006-0525
(UNKNOWN)  XF  magiccalendar-index-sql-injection(24588)

- 漏洞信息

Magic Calendar Lite Index.PHP SQL注入漏洞
高危 SQL注入
2006-02-13 00:00:00 2006-02-14 00:00:00
        Magic Calendar Lite 1.02的cms/index.php中存在多个SQL注入漏洞。在禁用magic_quotes_gpc的情况下,远程攻击者可以借助(1) $total_login和(2) $total_password参数执行任意SQL命令。

- 公告与补丁


- 漏洞信息

Magic Calendar Lite cms/index.php Multiple Field SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-02-09 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Magic Calendar Lite Index.PHP SQL Injection Vulnerability
Input Validation Error 16734
Yes No
2006-02-20 12:00:00 2006-02-22 06:22:00
Aliaksandr Hartsuyeu is credited with the discovery of this vulnerability.

- 受影响的程序版本

Reamday Enterprises Magic Calendar Lite 1.02

- 漏洞讨论

Magic Calendar Lite is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.

Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

Version 1.02 is vulnerable; other versions may also be affected.

- 漏洞利用

No exploit is required.

The following proof of concept is available:

Login: ' or 1/*
Password: any

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at:

- 相关参考